Thanks to visit codestin.com
Credit goes to github.com

Skip to content

[BUG] security vulnerability #1273

@ThreepE0

Description

@ThreepE0

Problem Description

Remote HTML injection into extension UI (potential RCE in extension context)

  • The extension fetches an update “notice” from https://ext.scriptcat.org/ and renders it as raw HTML via React dangerouslySetInnerHTML.
  • Evidence:
    • Fetch: src/pages/popup/App.tsx:369
    • Render: src/pages/popup/App.tsx:485
    • Same update-check fetch in SW: src/app/service/service_worker/index.ts:113
  • Impact: if ext.scriptcat.org is compromised, misconfigured, or a malicious insider controls responses, they can
    inject scriptable HTML into the extension UI. In an extension with broad permissions (tabs/cookies/<all_urls>),
    that’s effectively a “developer-controlled remote code execution / data exfil” channel.
  • Recommended mitigation: do not render server-provided HTML. Render as plain text, or sanitize with a strict
    allowlist (no script, no event handlers, no javascript: URLs, no inline styles) before display.

This potential RCE vulnerability is so severe that I will not use Scriptcat because of it.

Reproduction Steps

n/a

ScriptCat Version

0

Operating System and Browser Information

n/a

Additional Information (Optional)

No response

Metadata

Metadata

Assignees

Labels

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions